CDK Global: A Cold-Hearted Reminder of Why Patch Management Matters

CDK Global: A Cold-Hearted Reminder of Why Patch Management Matters

A few weeks ago, CDK Global, a software provider with 15,000 North American car dealership customers, faced back-to-back cyberattacks, effectively taking down scheduling, records, and more for their thousands of customers for days. The CDK Global attack is also the latest cyber incident to spur larger industry-wide conversations around the supply chain risks posed by increasingly ruthless and aggressive bad actors.  

Axios had a good writeup on the news, exploring how “CDK is the latest victim in a long series of cyberattacks this year that started with just one tech vendor and rippled out to hundreds, if not thousands, of incidents throughout one sector” (you may recall the side effects of the successful cyberattack on Change Healthcare earlier this year, which took down healthcare payments, eligibility checks, and prescription fulfillment for weeks – even after the company doled out a mammoth $22 million ransom fee).  

Here’s what this incident underscores in my mind: It’s a largely unhelpful reminder that patch management matters, particularly as bad actors look to exploit interconnected supply chains and a growing swath of exposed endpoints.  

Defense in depth starts with patch management 

Patch management is critical for a successful defense-in-depth approach. Many cyber incidents today start with user interactions with phishing emails (according to Egress, 94 percent of organizations fell victim to phishing attacks in 2023). Compound that with poorly patched endpoints, and it’s a recipe for disaster.  

Too often, we see adversaries quickly move laterally throughout an organization through a poorly patched environment. Significantly, as organizations and their endpoint estates evolve – grow and expand, alongside trends like WFA and BYOD, or shrink due to consolidation and economic cost-cutting – organizations need to have the basics, like regularly patching, down pat.  

Unfortunately, many organizations still aren’t regularly patching, leaving them wide open to increasingly severe and interconnected threats. In fact, a few years back, ServiceNow found that unpatched vulnerabilities are directly responsible for 60 percent of all data breaches! 

Organizations must get patch management right to build a sustainable in-depth defense approach. However, to do that, businesses require solutions that make it easy to discover rogue and unknown assets that can be quickly assessed and managed by IT teams before they can cause harm. IT teams also need solutions that enable them to capture patches that cover security and vulnerabilities while omitting patches for tooling or utilities that aren’t vulnerable (which can introduce new issues for IT).  

Fortunately, the NinjaOne Network Management System (NMS) can help with all this and more. It gives organizations full visibility of their IT and endpoint estates to get ahead of and remediate risks as businesses grow, automates patching (to save IT teams time and resources while also ensuring that patches are run without the host being interrupted in service), and frees up time for training so IT teams are better prepared to handle cyber incidents when they inevitably occur.  

In the end, effective patch management is critical in building a lasting cyber resilience strategy. Understanding your total risk profile on the network and endpoints and effectively training your team to thwart cyber events when they happen are all critical components for defense-in-depth! 

Next Steps

Patching is the single most critical aspect of a device hardening strategy. According to Ponemon, almost 60% of breaches could be avoided through effective patching. NinjaOne makes it fast and easy to patch all your Windows, Mac, and Linux devices whether remote or on-site.

Learn more about NinjaOne Patch Management, schedule a live tour, or start your free trial of the NinjaOne platform.

You might also like

Ready to become an IT Ninja?

Learn how NinjaOne can help you simplify IT operations.

Watch Demo×
×

See NinjaOne in action!

By submitting this form, I accept NinjaOne's privacy policy.

Start your 14-day trial

No credit card required, full access to all features

NinjaOne Terms & Conditions

By clicking the “I Accept” button below, you indicate your acceptance of the following legal terms as well as our Terms of Use:

  • Ownership Rights: NinjaOne owns and will continue to own all right, title, and interest in and to the script (including the copyright). NinjaOne is giving you a limited license to use the script in accordance with these legal terms.
  • Use Limitation: You may only use the script for your legitimate personal or internal business purposes, and you may not share the script with another party.
  • Republication Prohibition: Under no circumstances are you permitted to re-publish the script in any script library belonging to or under the control of any other software provider.
  • Warranty Disclaimer: The script is provided “as is” and “as available”, without warranty of any kind. NinjaOne makes no promise or guarantee that the script will be free from defects or that it will meet your specific needs or expectations.
  • Assumption of Risk: Your use of the script is at your own risk. You acknowledge that there are certain inherent risks in using the script, and you understand and assume each of those risks.
  • Waiver and Release: You will not hold NinjaOne responsible for any adverse or unintended consequences resulting from your use of the script, and you waive any legal or equitable rights or remedies you may have against NinjaOne relating to your use of the script.
  • EULA: If you are a NinjaOne customer, your use of the script is subject to the End User License Agreement applicable to you (EULA).